Social engineering campaign leads to malicious Chrome extension

Security experts have discovered social engineering ruse that leads to a malicious Google Chrome extension that lures victims in a click fraud campaign.

Researchers at TrendMicro believe the malware is spreading through malicious shortened Twitter links. Those lead victims to a site that automatically downloads the malicious browser extension (TROJ_DLOADE.DND), according to a recent blog post.

Posing as a Flash Player extension in order to evade detection, the malware circumvents Google’s security policy – which only allows extension installations hosted in the Chrome Web Store – by creating a folder in the browser’s directory where it drops “browser extension components.”

Once installed, if a user visits Facebook or Twitter, the extension prompts a specific site in the background that is written in Turkish, which researchers believe is part of a click fraud or redirection scheme.

Read the Full Article: Source – SC Magazine

source not found

Related Article

Leave a Reply